|
ipsec_convert(8) -- Converts the format of IPsec certificate files
|
The ipsec_convert command converts files that contain public-key certificate information among the formats supported by the Tru64 UNIX IPsec software. This command and other related certificate comman... |
ipsec_keypaircheck(8) -- Checks if public and private keys match
|
The ipsec_keypaircheck command enables you to verify that public and private keys match. You specify public keys with either public-key or cert-file. You specify private keys with private-key. This co... |
ipsec_keytool(8) -- Generate RSA and DSA keys, and convert existing key formats
|
The ipsec_keytool command generates RSA and DSA keys for use by other IPsec tools. In addition, the command converts existing keys from one format to another. This command and other related certificat... |
ipsec_mgr(8) -- Manipulate the state of the IPsec subsystem
|
The ipsec_mgr command enables you to manipulate the state of the IPsec subsystem. It is currently limited to deleting an existing Security Association (SA). To delete an SA, you specify any Security P... |
iptunnel(8) -- Creates, deletes, and displays configured tunnels
|
The iptunnel command creates configured tunnels for sending and receiving the following types of encapsulated packets: IPv4 or IPv6 packets encapsulated as the payload of an IPv4 datagram. This is cal... |
ipv6sniff(8) -- Internet Protocol Version 6 (IPv6) search and analysis tool
|
The ipv6sniff tool searches one or more files to assist you in locating potential IPv6 porting issues. The tool searches for the following: IPv4-only socket usage and options IPv4 name and address res... |
it(8) -- configure a system after installation
|
The it program executes scripts before transferring control of the system to the user, typically before the first user logs in. The it program executes programs that collect information such as system... |
itruns(8) -- set up files for use by the it command
|
The itruns program sets up scripts to be run by it(8). (These programs are typically used within system configuration and installation scripts.) The itruns command searches for /sbin/it.d/bin/file. If... |
javaexecutedata(8) -- Mark JAVA libraries exempt for Buffer Overflow Protection security feature
|
This script is intended to be run immediately following the installation of the UNIX patch kit that contains the Buffer Overflow Protection security feature. Java libraries throughout the system need ... |
jdbdump(8) -- Dumps fields from the DHCP dynamic databases.
|
The jdbdump command reads the databases used by the joind daemon to store information on client IP address leases and dynamic names and prints selected fields. Each record is terminated by a newline, ... |
jdbmod(8) -- Adds, modifies, or deletes data in the DHCP dynamic databases.
|
The jdbmod command modifies the databases used by joind to store information on client IP address leases and dynamic names. The jdbmod command allows the user to load preassigned hardware-IP address c... |
jdbreg(8) -- Registers hosts in the DHCP dynamic databases.
|
The jdbreg program registers (or removes) hosts for configuration by DHCP. When the registered_hosts_only policy is in effect, the server configure only clients whose MAC addresses are so registered. ... |
jdbshow(8) -- Display the contents of a specific JOIN server database
|
The jdbshow command displays the contents of the specified JOIN server databases. The databases are identified by letter, for example, the letter a refers to dba.hsh. The jdbshow command expects to fi... |